|
1 What Is at Stake? What Should You Do? Why Should You Care? |
|
|
1 | (24) |
|
Houston, Texas, and the "Hacked Baby Cam" in the Nursery |
|
|
1 | (1) |
|
The Sum of 22,000 lb Transferred from Elderly Mother's Bank Account in London, England |
|
|
2 | (1) |
|
Couple Sentenced for False Tax Refund Conspiracy |
|
|
3 | (1) |
|
Teens and Cyber Identity Theft |
|
|
3 | (1) |
|
Kaitlin Jackson's Campaign Against Cyberbullying Trolls |
|
|
4 | (1) |
|
Hacking into Aircraft Communications and IT Wireless Communications Networks |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
Level One Threats to Be Taken Seriously |
|
|
8 | (8) |
|
|
8 | (1) |
|
|
9 | (1) |
|
The Trade in Swipeable Credit Card Information |
|
|
9 | (2) |
|
The Cyber Criminal Bazaar |
|
|
11 | (3) |
|
Cyber Thieves and Medical Records |
|
|
14 | (1) |
|
Nigerian Prince Come-Ons and the Latest in Targeted Online Scams |
|
|
14 | (1) |
|
Protecting Against Personal Cyber Attacks |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Trojans on the Attack Against Banks |
|
|
16 | (1) |
|
Insurance Collapse Due to Massive Cyber Attacks |
|
|
17 | (1) |
|
The "Internet of Things": A World in Which Cars, Appliances, and Almost Everything Is Connected to the Net |
|
|
18 | (1) |
|
|
19 | (2) |
|
GPS Resilience and Vulnerability |
|
|
19 | (1) |
|
Attack on Water and Sewage Systems via SCADA Systems |
|
|
20 | (1) |
|
Transit Systems and Aircraft Safety at Risk |
|
|
21 | (1) |
|
A Recap of Why You Should Care |
|
|
21 | (2) |
|
|
23 | (2) |
|
2 Where to Go for Assistance |
|
|
25 | (24) |
|
|
25 | (2) |
|
Electronic Filters That Protect Against Malware Intrusions |
|
|
27 | (3) |
|
|
29 | (1) |
|
Identity Theft Protection |
|
|
30 | (4) |
|
Firewalls and Backup Memory |
|
|
34 | (3) |
|
Common Features That Personal Firewall Can Offer |
|
|
35 | (1) |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
38 | (1) |
|
And Now How to Protect Your Family Against Cyberbullies, Pornography, Online Hate Messages, and Other Cyber-Related Maladies |
|
|
39 | (2) |
|
What to Do About Protecting Your Family's Computers from Cyber Criminals, Stalkers and Bullies |
|
|
41 | (3) |
|
What to Do About Pornographic Sites and Sexting |
|
|
44 | (1) |
|
Protective Strategies for the Over-50 Crowd |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (2) |
|
3 Is Anyone Looking Out for You? Your Government? Businesses Where You Trade? Your Neighbor? or Just Yourself? |
|
|
49 | (18) |
|
Governmental Issues: The "Snowden Factor" |
|
|
52 | (6) |
|
Corporate and Industrial Issues |
|
|
58 | (2) |
|
Individual Transgressions and Cyber-World Concerns |
|
|
60 | (2) |
|
|
62 | (3) |
|
|
65 | (2) |
|
4 Ten Key Things to Protect |
|
|
67 | (16) |
|
|
67 | (1) |
|
The Top Ten Things for You and Your Family to Protect Against and How |
|
|
68 | (11) |
|
#1 Protect Stocks, Bonds, and Retirement Accounts |
|
|
69 | (2) |
|
#2 Protect Your Bank Account and Credit Card Account Records |
|
|
71 | (1) |
|
#3 Protect Your Social Security, Medicare/Medicaid Accounts and Medical Records |
|
|
72 | (1) |
|
#4 Protect Desktop Computers, Wi-Fi, and Computer Routing Systems (LANS and WANS) |
|
|
73 | (1) |
|
#5 Protect Personal Cell Phones/Smart Phones |
|
|
74 | (1) |
|
#6 Upgrade Cyber Security Systems for Vital Infrastructure |
|
|
75 | (1) |
|
#7 Protect Big Data and Social Media: And At Least Some of Your Privacy |
|
|
76 | (1) |
|
#8 Don't Put All of Your Eggs in One Basket |
|
|
77 | (1) |
|
#9 Protect Yourself by Doing Audits |
|
|
78 | (1) |
|
#10 Protect Your Personal Things, Your Family, and Your Business Interests, Including Your Last Will and Testament, Plus Donations and Legacy |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (3) |
|
5 Cybersecurity for Smart Phones, Mobile Apps, and "The Cloud" |
|
|
83 | (20) |
|
|
83 | (2) |
|
The Dangers of Wi-Fi Access to the Internet |
|
|
85 | (1) |
|
Mobile Applications on Smart Phones |
|
|
86 | (1) |
|
Mobile Phone Security and Access |
|
|
87 | (1) |
|
Making Your Smart Phone More Secure |
|
|
88 | (1) |
|
Cybersecurity and Banking Apps |
|
|
89 | (3) |
|
|
92 | (8) |
|
Evaluating Personal Cloud Services (Fig. 5.3) |
|
|
92 | (8) |
|
|
100 | (1) |
|
|
100 | (3) |
|
6 Protecting Vital Cyber Infrastructure |
|
|
103 | (24) |
|
|
103 | (2) |
|
SCADA Networks in Our Lives that We Never See |
|
|
105 | (3) |
|
SCADA Systems Security in a Community |
|
|
107 | (1) |
|
Satellite Networks and Cyber Risks |
|
|
108 | (9) |
|
Satellites and Cybersecurity |
|
|
109 | (1) |
|
Satellite Technology and Systems |
|
|
110 | (2) |
|
Application Satellites with Cybersecurity Implications |
|
|
112 | (5) |
|
Fixed Satellite Systems and High Throughput Satellites |
|
|
117 | (1) |
|
|
118 | (5) |
|
Conventional Mobile Satellite Communications |
|
|
119 | (2) |
|
Mobile Satellite Systems with ATC Ancillary Terrestrial Component |
|
|
121 | (2) |
|
|
123 | (1) |
|
|
124 | (3) |
|
7 Who Will Control the Future, Black Hat Hackers or the Hacked? |
|
|
127 | (18) |
|
|
127 | (1) |
|
How Do We Protect Ourselves from Cyber-Attacks Going Forward? |
|
|
128 | (3) |
|
Coping with Current and Future Cyber Threats |
|
|
131 | (1) |
|
Nearer Term Threats: Computer Fraud, Wi-Fi, Wireless LANs, and the Cloud |
|
|
132 | (1) |
|
Wireless Local Area Networks (LANs) and Satellite Networking |
|
|
133 | (2) |
|
Security Flaws in The Cloud |
|
|
134 | (1) |
|
Best Practices for Companies in the Cloud |
|
|
134 | (1) |
|
Cyber Protection of Vital Infrastructure Under U.S. Government and Corporate Management |
|
|
135 | (3) |
|
|
138 | (1) |
|
Vulnerable Apps on Smart Phones and Desktop Computers |
|
|
138 | (2) |
|
|
140 | (1) |
|
Hololens and Cybersecurity |
|
|
141 | (1) |
|
|
142 | (1) |
|
Post-conclusions: Cyber Opportunities vs. Cyber Threats to Our Lives? |
|
|
143 | (1) |
|
|
144 | (1) |
|
8 Ten Essential Rules for Your Cyber Defense |
|
|
145 | (12) |
|
#1 Protect Your Personal Records and Your Passwords |
|
|
145 | (2) |
|
#2 Obtain a Secure Place to Store Vital Information |
|
|
147 | (1) |
|
#3 Shred All Financial, Medical, and Other Personal Information that You Discard |
|
|
147 | (1) |
|
#4 Get AntiVirus Software Protection |
|
|
148 | (1) |
|
#5 Prevent Your Identity from Being Stolen |
|
|
149 | (2) |
|
#6 Obtain at Least the Basic Personal Firewall Protection |
|
|
151 | (1) |
|
#7 Recognize Warning Signs and Respond Quickly to Threats |
|
|
151 | (1) |
|
#8 Consider Getting Comprehensive Insurance Against Financial and Cyber-Loss |
|
|
152 | (1) |
|
#9 Support the Adoption of Stricter Governmental Legislation and Standards for Cybersecurity |
|
|
153 | (1) |
|
#10 Take Common Sense Steps to Guard Against Cyber-Attacks |
|
|
154 | (1) |
|
|
155 | (2) |
Appendix A Glossary of Definitions and Acronyms |
|
157 | (18) |
Appendix B Current U. S. Priorities on Cybersecurity |
|
175 | (4) |
Appendix C The U.S. Comprehensive National Cybersecurity Initiative (CNCI) |
|
179 | (10) |
Appendix D Cybersecurity Activities and Policies Around the World |
|
189 | (12) |
About the Authors |
|
201 | (6) |
Index |
|
207 | |